Analysis

  • max time kernel
    137s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 17:48

General

  • Target

    a3936ce16d3058148aa89df5bdfbee2db9eb6936f22a699b0b63a8fcfab6ef06.exe

  • Size

    696KB

  • MD5

    363d3d19fb05eea509e8509a8b3a67cd

  • SHA1

    1584877063d139b2bd3b37ce7193b7e0b3106bbe

  • SHA256

    a3936ce16d3058148aa89df5bdfbee2db9eb6936f22a699b0b63a8fcfab6ef06

  • SHA512

    9379633f07bcd1b2804db1ea267f96e7d06b22f6def3a631c75bf8b741842c9aea12cdddad8d254ad01aeb8d42593cb85b5d9da7454ee22c063b36f40ba93df1

  • SSDEEP

    12288:uMrZy90QQQhRVTlVbGgmFp4z0KbuS/1akbLaXnhgoTwqhv33iAlk:fy02jVSvv4AK7ckbLwhgoUqN3m

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3936ce16d3058148aa89df5bdfbee2db9eb6936f22a699b0b63a8fcfab6ef06.exe
    "C:\Users\Admin\AppData\Local\Temp\a3936ce16d3058148aa89df5bdfbee2db9eb6936f22a699b0b63a8fcfab6ef06.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un913015.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un913015.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1783.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1783.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:880
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 1084
          4⤵
          • Program crash
          PID:3536
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6152.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6152.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1852
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 1828
          4⤵
          • Program crash
          PID:840
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si346661.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si346661.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2324
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 880 -ip 880
    1⤵
      PID:3752
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1852 -ip 1852
      1⤵
        PID:3760

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si346661.exe

        Filesize

        175KB

        MD5

        2404576176331a97acacbb087157b817

        SHA1

        d785a07921c1948765630bea08c1b50a4ab4d71e

        SHA256

        d52d74efe89159937da351d54a454e5f80033201b372c5f1912ef9358e19f618

        SHA512

        3c2fbe723f1a9b8c0b8ff5d3600a24104e5400be3d1285c7ecc6d10091894f1dfdbfba8a858075bc332fe6d97da0a60a9e4ffe3ab23a4d61467d11f2973b2fe6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si346661.exe

        Filesize

        175KB

        MD5

        2404576176331a97acacbb087157b817

        SHA1

        d785a07921c1948765630bea08c1b50a4ab4d71e

        SHA256

        d52d74efe89159937da351d54a454e5f80033201b372c5f1912ef9358e19f618

        SHA512

        3c2fbe723f1a9b8c0b8ff5d3600a24104e5400be3d1285c7ecc6d10091894f1dfdbfba8a858075bc332fe6d97da0a60a9e4ffe3ab23a4d61467d11f2973b2fe6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un913015.exe

        Filesize

        554KB

        MD5

        f86b866a434b39e1e2f26165f2661ac4

        SHA1

        c3638516b172c1375afe756b3d5cf6b75d25d53c

        SHA256

        a8c71d13d970cc3030623ebb748c1b22108c9e9405f470c2ec844e183048b075

        SHA512

        bd64171c05213a689bfc7b43b936f920d3ac75136bc3f95619949f18eddf8e7de485e0dce2cd81afe30ebe3c8fb8db10f884472ecdd3c3293c903ce7ee5d611a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un913015.exe

        Filesize

        554KB

        MD5

        f86b866a434b39e1e2f26165f2661ac4

        SHA1

        c3638516b172c1375afe756b3d5cf6b75d25d53c

        SHA256

        a8c71d13d970cc3030623ebb748c1b22108c9e9405f470c2ec844e183048b075

        SHA512

        bd64171c05213a689bfc7b43b936f920d3ac75136bc3f95619949f18eddf8e7de485e0dce2cd81afe30ebe3c8fb8db10f884472ecdd3c3293c903ce7ee5d611a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1783.exe

        Filesize

        308KB

        MD5

        2c267b261ebcbc2f9ddd0e4970951f2c

        SHA1

        15b1ae7e089c5653ef4a2f51146a3c4e2e68ae35

        SHA256

        6134066b967d45a0649bf324d459a7bd93cf1764b44d0851a9742e8c48aa8021

        SHA512

        eb2a3528049346393827732564dd1ee3610f9cdb8ef493e5b8c02a2c88084767a122bfdd40961e0657eb71e5c9e1e00581d7606bb2e840d24837367fc3ee89d4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1783.exe

        Filesize

        308KB

        MD5

        2c267b261ebcbc2f9ddd0e4970951f2c

        SHA1

        15b1ae7e089c5653ef4a2f51146a3c4e2e68ae35

        SHA256

        6134066b967d45a0649bf324d459a7bd93cf1764b44d0851a9742e8c48aa8021

        SHA512

        eb2a3528049346393827732564dd1ee3610f9cdb8ef493e5b8c02a2c88084767a122bfdd40961e0657eb71e5c9e1e00581d7606bb2e840d24837367fc3ee89d4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6152.exe

        Filesize

        366KB

        MD5

        032e323f84ed396f3d514b96ea96458b

        SHA1

        1f4db74cf0dd5798e4aab59daf99e2d7153aa6aa

        SHA256

        1e91284a3f973105f7a7cab9e12c0ac051cd3504860bb9c4bcbf167d98acc77d

        SHA512

        a5426cafc64c31aa09cbf3ccb24a623ec9f277334d027fbbf7a8cdc697127432d6b438bda1099640b0fccf040ddd0311740d4848d8a33925377b7ae3ce3e2a1b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6152.exe

        Filesize

        366KB

        MD5

        032e323f84ed396f3d514b96ea96458b

        SHA1

        1f4db74cf0dd5798e4aab59daf99e2d7153aa6aa

        SHA256

        1e91284a3f973105f7a7cab9e12c0ac051cd3504860bb9c4bcbf167d98acc77d

        SHA512

        a5426cafc64c31aa09cbf3ccb24a623ec9f277334d027fbbf7a8cdc697127432d6b438bda1099640b0fccf040ddd0311740d4848d8a33925377b7ae3ce3e2a1b

      • memory/880-148-0x0000000004DC0000-0x0000000005364000-memory.dmp

        Filesize

        5.6MB

      • memory/880-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/880-150-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/880-151-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/880-152-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/880-153-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/880-154-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/880-156-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/880-158-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/880-160-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/880-162-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/880-164-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/880-166-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/880-168-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/880-170-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/880-172-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/880-174-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/880-176-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/880-178-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/880-180-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/880-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/880-182-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/880-183-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/880-184-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/880-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/1852-192-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-191-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-194-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-196-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-198-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-200-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-202-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-204-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-206-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-208-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-210-0x0000000000910000-0x000000000095B000-memory.dmp

        Filesize

        300KB

      • memory/1852-212-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/1852-213-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/1852-211-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-216-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-215-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/1852-218-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-220-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-222-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-224-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-226-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-228-0x0000000004E10000-0x0000000004E4F000-memory.dmp

        Filesize

        252KB

      • memory/1852-1101-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/1852-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/1852-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/1852-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/1852-1105-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/1852-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/1852-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/1852-1109-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/1852-1110-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/1852-1111-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/1852-1112-0x0000000006710000-0x00000000068D2000-memory.dmp

        Filesize

        1.8MB

      • memory/1852-1113-0x00000000068F0000-0x0000000006E1C000-memory.dmp

        Filesize

        5.2MB

      • memory/1852-1114-0x0000000007190000-0x0000000007206000-memory.dmp

        Filesize

        472KB

      • memory/1852-1115-0x0000000007220000-0x0000000007270000-memory.dmp

        Filesize

        320KB

      • memory/1852-1116-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/2324-1122-0x0000000000410000-0x0000000000442000-memory.dmp

        Filesize

        200KB

      • memory/2324-1123-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB